English  |  正體中文  |  简体中文  |  Post-Print筆數 : 27 |  Items with full text/Total items : 110097/141043 (78%)
Visitors : 46404527      Online Users : 1121
RC Version 6.0 © Powered By DSPACE, MIT. Enhanced by NTU Library IR team.
Scope Tips:
  • please add "double quotation mark" for query phrases to get precise results
  • please goto advance search for comprehansive author search
  • Adv. Search
    HomeLoginUploadHelpAboutAdminister Goto mobile version
    政大機構典藏 > 資訊學院 > 資訊科學系 > 學位論文 >  Item 140.119/60257
    Please use this identifier to cite or link to this item: https://nccur.lib.nccu.edu.tw/handle/140.119/60257


    Title: 整合資料在雲端環境上的分享與 隱私保護-以電子病歷資料為例
    Sharing and Protection of Integrated Data in the Cloud : Electronic Health Record as an Example
    Authors: 楊竣展
    Yang, Jiun Jan
    Contributors: 胡毓忠
    Hu, Yuh Jong
    楊竣展
    Yang, Jiun Jan
    Keywords: 隱私保護
    語意網
    資料整合
    雲端運算
    data integration
    privacy protection
    cloud computing
    semantic web
    Date: 2010
    Issue Date: 2013-09-04 17:09:29 (UTC+8)
    Abstract: 由於電子化病歷逐漸取代了傳統的紙本病歷,在流通分享上面比傳統的紙本病歷更加來的方便及快速,另外電子病歷的整合性,也是比傳統的紙本來的有效。近年來雲端運算的發展,使得醫療系統在電子病歷上能夠更快速的發展,但是取而代之的是卻是雲端運算所產生隱私權的問題,在快速發展的雲端運算環境中,目前似乎無法完全確保資料的隱私性。即使現有的研究中可以讓資料擁有者表示自己的隱私偏好,卻因為設計時缺乏語意的考量,造成執行上有語意的落差。
    本研究將探討電子病歷存放在雲端環境上,設計一套三層整合平台系統並使用語意化技術本體論整合來自多方的資料,達成在資料庫上使用OWL2作為整合的語言,並在此整合平台進行本體論整合,能夠讓使用者可以從多方的醫療中心快速查詢整合的資料,經由整合平台的改寫,到下層的規範擷取到上層平台進行管理與落實動作,最終在資料庫查詢資料,達成整合分享的目標,並同時能夠兼顧資料擁有者的隱私期待,完成在雲端環境上資料分享、整合、隱私保護的目標。
    The Electronic Health Records (EHRs) have replaced the traditional paper Health Records gradually and they are more rapid and more convenient in data sharing. Furthermore, the EHRs are also better than paper health records when health records need to be integrated on the computer.
    In recent years, the rapid development of cloud computing can help Health Information System to be more dynamic and provide a better service, but the problem of privacy is a critical issue. Although recent research can let data owner expresses his own personal privacy preference in to policy to protect privacy, it is lacked of semantics and that will result in the gap between the real meaning of personal privacy preference and of policy.
    In our research, we will using semantic technology to express personal privacy preference in to polices and also design the 3-layer integration platform to achieve semantics data integration so that polices can be enforced without loss of real meaning of personal privacy preference and polices will have interoperability with others when we are using semantic data integration.
    Reference: D. Calvanese, et al., "Data Integration through DL-LiteA Ontologies," in Revised Selected Papers of the 3rd Int. Workshop on Semantics
    in Data and Knowledge Bases (SDKB 2008). vol. 4925, K.-D. Schewe and B. Thalheim, Eds., ed: Springer, 2008, pp. 26-47.

    [2] D. Calvanese, et al., "Using OWL in Data Integration," in Semantic Web Information Management - a Model Based Perspective, D. Virgilio, et al., Eds., ed: Springer, 2009, pp. 397-424.

    [3] B. Katt, et al., "Privacy and Access Control for IHE-Based Systems," in Electronic Healthcare. vol. 0001, D. Weerasinghe, Ed., ed: Springer Berlin Heidelberg, 2009, pp. 145-153.

    [4] H. Pérez-Urbina, et al., "Efficient Query Answering for OWL 2," in The Semantic Web - ISWC 2009. vol. 5823, A. Bernstein, et al., Eds., ed: Springer Berlin / Heidelberg, 2009, pp. 489-504.

    [5] S. D. C. d. Vimercati, et al., "Privacy of outsourced data," in Digital Privacy: Theory, Technologies and Practices, ed: Auerbach Publications (Taylor and Francis Group) 2007.

    [6] M. Lenzerini, "Data integration: a theoretical perspective," Proceedings of the twenty-first ACM SIGMOD-SIGACT-SIGART symposium on Principles of database systems, Madison, Wisconsin, 2002.

    [7] A. Y. Levy, et al., "Querying Heterogeneous Information Sources Using Source Descriptions," presented at the Proceedings of the 22th International Conference on Very Large Data Bases, 1996.

    [8] C. Lutz, et al., "Conjunctive query answering in the description logic EL using a relational database system," presented at the Proceedings of the 21st international jont conference on Artifical intelligence, Pasadena, California, USA, 2009.


    [9] J. Euzenat and P. Valtchev, "Similarity-based ontology alignment in OWL-Lite," 2004.

    [10] P. Hitzler, et al., "OWL 2 Rules," in ESEC, 2009.

    [11] M. A. C. Dekker, et al., "Audit-based Compliance Control (AC2) for EHR Systems," ed. Enschede: Centre for Telematics and Information Technology, University of Twente, 2007.

    [12] G. J. Annas, "HIPAA Regulations — A New Era of Medical-Record Privacy?," New England Journal of Medicine, vol. 348, pp. 1486-1490, 2003.

    [13] C. A. Ardagna, et al., "Exploiting cryptography for privacy-enhanced access control: A result of the PRIME Project," J. Comput. Secur., vol. 18, pp. 123-160, 2010.

    [14] C. A. Ardagna, et al., "XML-based access control languages," Information Security Technical Report, vol. 9, pp. 35-46.

    [15] D. Calvanese, et al., "Tractable Reasoning and Efficient Query Answering in Description Logics: The DL-LiteFamily," Journal of Automated Reasoning, vol. 39, pp. 385-429, 2007.

    [16] D. Calvanese and G. D. Giacomo, "Data integration: a logic-based perspective," AI Magazine, vol. 26, pp. 59-70, 2005.

    [17] Fran, et al., "Answering queries using views: A KRDB perspective for the semantic Web," ACM Trans. Internet Technol., vol. 4, pp. 255-288, 2004.

    [18] P. T. Jaeger, et al., "Cloud Computing and Information Policy: Computing in a Policy Cloud?," Journal of Information Technology & Politics, vol. 5, pp. 269 - 283, 2008.

    [19] Y. KALFOGLOU and M. SCHORLEMMER, "Ontology mapping: the state of the art," The Knowledge Engineering Review, vol. 18, pp. 1-31, 2003.

    [20] N. F. Noy and M. A. Musen, "The PROMPT suite: interactive tools for ontology merging and mapping," International Journal of Human-Computer Studies, vol. 59, pp. 983-1024, 2003.

    [21] H. Takabi, et al., "Security and Privacy Challenges in Cloud Computing Environments," IEEE Security and Privacy, vol. 8, pp. 24-31, 2010.

    [22] "First research report on research on next generation policies," Privacy and Identity Management in Europe for LifeFebruary 27, 2009.

    [23] M. Armbrust, et al., "Above the Clouds: A Berkeley View of Cloud Computing," EECS Department, University of California, Berkeley UCB/EECS-2009-28, February 10 2009.

    [24] H. Garcia-Molina, et al., "Integrating and Accessing Heterogeneous Information Sources in TSIMMIS," Stanford Infolab, Technical Report,1994.

    [25] R. Herold, "European Union (EU) Data Protection Directive of 1995 Frequently Asked Questions " Computer Security Institute,2002.

    [26] 郭弘毅, "使用本體論與規則執行企業隱私保護規範," 碩士, 資訊科學學系, 國立政治大學.

    [27] Google Health. https://health.google.com

    [28] Safe Habor. EUR LEX. . http://eur-lex.europa.eu/LexUriServ/LexUriServ.do?uri=CELEX:32000D0520:EN:HTML

    [29] The Health Insurance Portability and Accountability Act. U.S. Department of Health & Human Services. http://www.hhs.gov/ocr/privacy/

    [30] Fair Information Practice Principle, Federal Trade Commission http://www.ftc.gov/reports/privacy3/fairinfo.shtm


    [31] P. Ashley, et al. Enterprise Privacy Authorization Language (EPAL 1.2). http://www.w3.org/Submission/2003/SUBM-EPAL-20031110/,2003

    [32] I. Horrocks, et al. SWRL: A Semantic Web Rule Language
    Combining OWL and RuleML. http://www.daml.org/2004/11/fol/rules-all,2004

    [33] B. Motik, et al. OWL 2 Web Ontology Language Profiles. http://www.w3.org/TR/owl2-profiles/,2009
    Description: 碩士
    國立政治大學
    資訊科學學系
    98753036
    99
    Source URI: http://thesis.lib.nccu.edu.tw/record/#G0098753036
    Data Type: thesis
    Appears in Collections:[資訊科學系] 學位論文

    Files in This Item:

    File SizeFormat
    303601.pdf853KbAdobe PDF2621View/Open


    All items in 政大典藏 are protected by copyright, with all rights reserved.


    社群 sharing

    著作權政策宣告 Copyright Announcement
    1.本網站之數位內容為國立政治大學所收錄之機構典藏,無償提供學術研究與公眾教育等公益性使用,惟仍請適度,合理使用本網站之內容,以尊重著作權人之權益。商業上之利用,則請先取得著作權人之授權。
    The digital content of this website is part of National Chengchi University Institutional Repository. It provides free access to academic research and public education for non-commercial use. Please utilize it in a proper and reasonable manner and respect the rights of copyright owners. For commercial use, please obtain authorization from the copyright owner in advance.

    2.本網站之製作,已盡力防止侵害著作權人之權益,如仍發現本網站之數位內容有侵害著作權人權益情事者,請權利人通知本網站維護人員(nccur@nccu.edu.tw),維護人員將立即採取移除該數位著作等補救措施。
    NCCU Institutional Repository is made to protect the interests of copyright owners. If you believe that any material on the website infringes copyright, please contact our staff(nccur@nccu.edu.tw). We will remove the work from the repository and investigate your claim.
    DSpace Software Copyright © 2002-2004  MIT &  Hewlett-Packard  /   Enhanced by   NTU Library IR team Copyright ©   - Feedback